Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/11/2022, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
PONM100021791.exe
Resource
win7-20220812-en
General
-
Target
PONM100021791.exe
-
Size
670KB
-
MD5
6d5164ff97b46d355834bb135fc174cd
-
SHA1
d8263265426c4d673948be661d6254c49e1da6b2
-
SHA256
51a2542d1b273f9d3d1c1b8817d77451c46bdb03e22c7b25c05f383b289305d0
-
SHA512
31b615ea6c4c0ae87bc3a23688eecd0283e56266223c24887b58c47b1839d10d2c0e8c11f6b0b004e6acec83e7492819ce63387e0bfe865b24cddc07773c3cd0
-
SSDEEP
12288:OVAgHtDg5xE1A5a4Kshw8GRw+lInuCW4Xjo1AxKMyHhu/NhqNRa9:y4Padsheh6xvyHhu2i
Malware Config
Extracted
formbook
4.1
g47e
73346.top
matureshift.shop
bohnergroup.com
snehq.store
7pijj.com
wineshopsonline.com
reactivecreditagric.mom
aganderson.net
1800302.vip
942565.com
phonetography.club
garansugar.com
pinetree.email
34245.top
thejoy.run
pointvirtualrx.com
pqz.info
paddleboards.shop
vvapro.info
8peakssustainablelab.com
andareshoes.com
theblockdatasystem.com
torazemi.com
icloudlost.info
tentukan-t4rlftransfer.xyz
easytosuccess.com
kirkzero318.top
lkareea.site
decentralizedponzi.com
58worchester.info
portalmet.com
soul-church.net
work-service.monster
warungslots.com
onlynewslook.info
rfrcomunicate.com
shadyoakministries.com
jamesporcelain.store
reviewmgmtsystem.com
stnicholaswtc.store
flayos.xyz
kfcvn3.tech
swashbuckler-garron.info
capegrimwater.store
cheyanderson.com
jimsnell.xyz
vjonir.online
timelapsefx.com
klixyo.com
jeux.stream
zenmessageip.monster
olaf-droste-products.net
jsonlu.xyz
alfakhamahusa.net
makeeverywheresafer.com
longergolf.com
mscechbgdansk.com
nurse-note.net
uqyvtje.top
ky9940.com
buthyggg.com
laesperanzarealista.com
casasdosbinos.site
nobullpc.com
prequelgenetics.com
Signatures
-
Formbook payload 5 IoCs
resource yara_rule behavioral1/memory/948-62-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/948-63-0x000000000041F0E0-mapping.dmp formbook behavioral1/memory/948-65-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral1/memory/1592-72-0x00000000000E0000-0x000000000010F000-memory.dmp formbook behavioral1/memory/1592-76-0x00000000000E0000-0x000000000010F000-memory.dmp formbook -
Deletes itself 1 IoCs
pid Process 1572 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1032 set thread context of 948 1032 PONM100021791.exe 29 PID 948 set thread context of 1232 948 PONM100021791.exe 15 PID 1592 set thread context of 1232 1592 wuapp.exe 15 -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1032 PONM100021791.exe 948 PONM100021791.exe 948 PONM100021791.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe 1592 wuapp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 948 PONM100021791.exe 948 PONM100021791.exe 948 PONM100021791.exe 1592 wuapp.exe 1592 wuapp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1032 PONM100021791.exe Token: SeDebugPrivilege 948 PONM100021791.exe Token: SeDebugPrivilege 1592 wuapp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1352 1032 PONM100021791.exe 28 PID 1032 wrote to memory of 1352 1032 PONM100021791.exe 28 PID 1032 wrote to memory of 1352 1032 PONM100021791.exe 28 PID 1032 wrote to memory of 1352 1032 PONM100021791.exe 28 PID 1032 wrote to memory of 948 1032 PONM100021791.exe 29 PID 1032 wrote to memory of 948 1032 PONM100021791.exe 29 PID 1032 wrote to memory of 948 1032 PONM100021791.exe 29 PID 1032 wrote to memory of 948 1032 PONM100021791.exe 29 PID 1032 wrote to memory of 948 1032 PONM100021791.exe 29 PID 1032 wrote to memory of 948 1032 PONM100021791.exe 29 PID 1032 wrote to memory of 948 1032 PONM100021791.exe 29 PID 1232 wrote to memory of 1592 1232 Explorer.EXE 30 PID 1232 wrote to memory of 1592 1232 Explorer.EXE 30 PID 1232 wrote to memory of 1592 1232 Explorer.EXE 30 PID 1232 wrote to memory of 1592 1232 Explorer.EXE 30 PID 1232 wrote to memory of 1592 1232 Explorer.EXE 30 PID 1232 wrote to memory of 1592 1232 Explorer.EXE 30 PID 1232 wrote to memory of 1592 1232 Explorer.EXE 30 PID 1592 wrote to memory of 1572 1592 wuapp.exe 31 PID 1592 wrote to memory of 1572 1592 wuapp.exe 31 PID 1592 wrote to memory of 1572 1592 wuapp.exe 31 PID 1592 wrote to memory of 1572 1592 wuapp.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\PONM100021791.exe"C:\Users\Admin\AppData\Local\Temp\PONM100021791.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\PONM100021791.exe"{path}"3⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\PONM100021791.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PONM100021791.exe"3⤵
- Deletes itself
PID:1572
-
-